General
-
Target
eb40ed67103902d8d3f7d78dd7e4e229754db94e3458041f79dee35f738a1cf6.exe
-
Size
536KB
-
Sample
241111-das9ya1fmc
-
MD5
5541a5e3c177c8d1b3287ea6b6e1a83d
-
SHA1
e7ab4768aefa0c0b9227345663368b1c24fc5d09
-
SHA256
eb40ed67103902d8d3f7d78dd7e4e229754db94e3458041f79dee35f738a1cf6
-
SHA512
27f23cf66739727e75c92e5372f85a792b955f709e0153dd557c445c4814badb18efa8148142be0cdc602f618ba1624a9383de26708128f8d6d3d42f5bcc330e
-
SSDEEP
12288:LMrBy90B409nDMj3ghUTb1gsjT9EJZ6mt+pmp5iCRZzl9:mycbHcb/T6JMmYpmBDx9
Static task
static1
Behavioral task
behavioral1
Sample
eb40ed67103902d8d3f7d78dd7e4e229754db94e3458041f79dee35f738a1cf6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
eb40ed67103902d8d3f7d78dd7e4e229754db94e3458041f79dee35f738a1cf6.exe
-
Size
536KB
-
MD5
5541a5e3c177c8d1b3287ea6b6e1a83d
-
SHA1
e7ab4768aefa0c0b9227345663368b1c24fc5d09
-
SHA256
eb40ed67103902d8d3f7d78dd7e4e229754db94e3458041f79dee35f738a1cf6
-
SHA512
27f23cf66739727e75c92e5372f85a792b955f709e0153dd557c445c4814badb18efa8148142be0cdc602f618ba1624a9383de26708128f8d6d3d42f5bcc330e
-
SSDEEP
12288:LMrBy90B409nDMj3ghUTb1gsjT9EJZ6mt+pmp5iCRZzl9:mycbHcb/T6JMmYpmBDx9
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1